A method for signing and subsequently verifying a digital message, including the following steps implemented using at least one processor-based subsystem: selecting parameters including an integer q and a relatively smaller integer p that is coprime with q; generating random polynomial f relating to p and random polynomial g relating to q; producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse of f mod q; producing a private key from which f and g can be derived; storing the private key and publishing the public key; producing a message digest by applying a hash function to the digital message; producing a digital signature using the message digest and the private key; and performing a verification procedure utilizing the digital signature and the public key to determine whether the signature is valid.

A method for signing a digital message, including the following steps: selecting parameters that include first and second primes, a ring of polynomials related to the primes, and at least one range-defining integer; deriving private and public keys respectively related to a random polynomial private key of the ring of polynomials, and to evaluations of roots of unity of the random polynomial to obtain a public key set of integers; storing the private key and publishing the public key; signing the digital message by: (A) generating a noise polynomial, (B) deriving a candidate signature by obtaining a hash of the digital message and the public key evaluated at the noise polynomial, and determining the candidate signature using the private key, a polynomial derived from the hash, and the noise polynomial, (C) determining whether the coefficients of the candidate signature are in a predetermined range dependent on the at least one range-defining integer, and (D) repeating steps (A) through (C) until the criterion of step (C) is satisfied, and outputting the resultant candidate signature as an encoded signed message.

Fintech company Digital X has confirmed that it is a step closer in rolling out and commercialising AirPocket, the company's global remittance product.
Recently rebranded from Digital CC, Digital X announced as part of its September 2015 quarter update that it successfully completed two phases of internal testing of AirPocket with independent US security firm Security Innovation.
According to the firm, the testing demonstrated that AirPocket's infrastructure has the ability to handle loads of up to 12 transactions per second and over 1 million per day.
In addition, the company also secured money transmission services in the US through an agreement with US based payments company, CoinX. Digital X said the partnership is expected to help accelerate the development and commercialisation of AirPocket by up to two years, as the company will leverage CoinX's already established and licensed banking relationship in 40 US states.
As a result, the company was able to publicly launch the beta version of AirPocket on September 29, 2015.
"The completion of the security testing and security money transmitter licenses culminated in the public beta launch of AirPocket with remittance now being sent from the US to Dominican Republic via the application.
"The first phase of public beta is now complete and feedback from users was overwhelmingly positive," the company said.
The company said it plans to expand its second stage of beta testing to a larger number of users, up to 1,000, and is due to commence in November 2015. Testing will commence with iOS and will be expanded to Android.
AirPocket's full public launch is scheduled to commence in Q2 2016, the company said.
"Importantly, we have recently advanced negotiations for our first strategic AirPocket partner for the Latin American rollout and are looking forward to announcing this exciting development as soon as it has been completed," said Digital X executive chairman Zhenya Tsvetnenko.
In May, Digital X raised AU$3.5 million to fund the development and rollout of AirPocket, an app-based peer-to-peer, cross-currency cash remittance platform.
During the quarter, the company also reported that its Direct business achieved revenues of AU$5.3 million unaudited from Q3 2015, which was driven by adding low risk, high volume clients to the platform. The number of customers using Digital X also increased over 20 percent during the period against the previous quarter.
Looking ahead, the company said in the next quarter that Direct will be focused on further optimising its algorithmic hedging and market making operations, and will begin public promotion of its API for integrating the company's liquidity platform into third party applications.
Development is also underway to publishing public code repositories in various languages including python, Javascript, and C# for interacting with Digital X Direct API, the company said.
Digital X also reported it has had cash and bitcoin inventory of $3 million at September 30, 2015. This consisted of $2.3 million in cash and $0.7 million in bitcoin.
But the company will not be in the cryptocurrency business for much longer after announcing last week that it will be shifting its business model to focus on software development.
This comes after the former bitcoin miner defended cryptocurrency, despite reporting a net loss after tax of $6.77 million, and negative earnings before interest, tax, depreciation, and amortisation (EBITDA) of $3.16 million for the full year, ending June 2015. The company said at the time that its FY15 results reflected a "strong performance from the company's bitcoin operations", with bitcoin mining generating $6.4 million in revenue.
Similarly, in the first quarter of this financial year, the company reported its first loss, with a negative net operating cash flow of AU$261,000 for the three months ending September 2014. According to the company, despite the drop in value of bitcoin, the devaluation had not impacted its performance.
"Investors should of course remember that movement in the bitcoin price has little bearing on the technology and the digital currency revolution, of which we are a leading participant," Tsvetnenko said at the time.
"Short-term fluctuations do not affect our continued progress, and we are well funded to operate our business and work towards achieving our near-term goals around managing our mining capacity and launching our cutting-edge software products."

SAN MATEO, CA--(Marketwired - Oct 26, 2015) - TrapX, a global leader in advanced cyber security defense, today announced that it has successfully completed integration with the McAfee® Data Exchange Layer (DXL) communication platform. DXL enables the TrapX DeceptionGrid to integrate directly with the McAfee Threat Intelligence Exchange (TIE). DeceptionGrid can now provide actionable intelligence and initiate activity throughout the line of Intel Security products and other Intel Security Innovation Alliance partner's products on TIE. This allows direct remediation actions to be taken, such as shutting down an attack in-flight and quarantining compromised assets in real-time. This enhances customers' ability to identify and defeat many advanced threats such as the APT, zero-day events and other sophisticated malware attacks.
DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with real information technology resources. These traps appear identical in every way to real IT assets. Once sophisticated malware has slipped past other primary cyber defenses and penetrated the enterprise, it continues to move laterally to find high-value targets. Just one touch of DeceptionGrid sets off a high-confidence alert. Through the use of the DXL fabric, this alert can drive actions to mitigate the attack rapidly and resume normal operations.
"Dynamic Deception Operations (DDO) gives our customers the strongest set of options available to find and defeat attackers that have already breached the perimeter. We've automated everything and integrated DDO tightly with Intel® Security's threat intelligence sharing ecosystem," said Carl Wright, executive vice president and general manager at TrapX Security. "Now we can move with speed and in concert with other Intel Security partner capabilities and products to shut the attack down before the attacker can achieve their objectives or spread."
"By implementing products that are integrated with Intel Security solutions, we believe our customers will experience faster deployment times, and with faster deployment times come reduced costs," said D.J. Long, senior director, head of the Security Innovation Alliance at Intel Security. "TrapX's integration with TIE over the DXL platform provides customers with actionable intelligence to manage their multi-vendor security environments."
TrapX will also be demonstrating DeceptionGrid at this year's RSA conference taking place in San Francisco February 29 through March 4, 2016.
TrapX is a member of the Intel Security Innovation Alliance: http://www.mcafee.com/us/partners/security-innovation-alliance/index.aspx. The Intel Security Innovation Alliance is a technology partner program that facilities interoperability and streamlines the integration of security products in complex customer environments. By working together, Intel Security and its partners aim to deliver more complete security solutions designed to safeguard systems more effectively than solutions available from any single vendor.
TrapX Security™ and DeceptionGrid™ are trademarks licensed by TrapX Security, Inc.
Visit the TrapX Website: www.trapx.com
Watch a 60 Second Introduction to Deception Technology: http://trapx.com/whitehat-versus-blackhat/
Learn more about DeceptionGrid: http://trapx.com/products/deceptiongrid/
Visit the TrapX blog: http://www.trapx.com/blog/
Follow TrapX on Twitter: @trapxsecurity
Follow TrapX on LinkedIn: https://www.linkedin.com/company/trapx
Like TrapX on Facebook: https://www.facebook.com/pages/TrapX/258804147648401
About TrapX
TrapX Security is a leader in the delivery of advanced threat cyber security defense. Our deception-based solutions rapidly detect, analyze and defend against new zero day and APT attacks in real-time. DeceptionGrid provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. We enable a pro-active security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes global 2000 commercial and government customers around the world in sectors including defense, healthcare, finance, energy, consumer products and other key industries. Learn more at www.trapx.com.
Intel, the Intel logo, McAfee, and the McAfee logo are trademarks of Intel Corporation in the U.S. and/or other countries.
No computer system can be absolutely secure.
Cost reduction scenarios described are intended as examples of how a given Intel Security product, in the specified circumstances and configurations, may affect future costs and provide cost savings. Circumstances will vary. Intel Security does not guarantee any costs or cost reduction.